The cyber security ecosystem: Defining a taxonomy of ...

24
The cyber security ecosystem: Defining a taxonomy of existing, emerging and future cyber threats

Transcript of The cyber security ecosystem: Defining a taxonomy of ...

The cyber security ecosystem: Defining a taxonomy of existing, emerging and future cyber threats

Jason Ferdinand Founder IKSM Ltd

The cyber security ecosystem

Computer and Network Incident Taxonomy (Howard and Longstaff, 1998: 15)

New Categories Old Categories

Script Kiddies Novice

Cyber-Punks Cyber-Punks, Virus Writers

Insiders Internals

Petty thieves Petty Thieves

Grey Hats Old Guard Hackers

Professional Criminals Professional Criminals, Information

Warriors

Hacktivists Political Activists

Nation states N/A, Information Warriors

(Hald and Pederson, 2012: 83)

(Simmons et. al. 2014)

AVOIDIT: Cyber Attack Taxonomy

Attack Vector Defense Info Impact Target

Misconfiguration Misuse of Resources

Mitigation Remediation Distort OS (Kernel / User / Driver)

Kernel Flaws User Compromise

Remove from Network Patch System

Disrupt Family

Design Flaws Whitelisting Destruct

Web Compromise

Correct Code Name

Buffer Overflow Reference

Advisement

Disclose

Version Installed Malware

Discover

Stack Network

Heap Virus Local

Insufficient Authentication Validation

System / Boot Record Infector User

File Application

CSRF Macro Serve

BA Spyware DB

URF Trojan Email Name

Insufficient Input Validation

Web Version Worm

SQLI Mass Client

XSS Network Name

Symbolic Link Denial of Service

Version

File Descriptor Attack Host Based

Race Condition Network Based

Incorrect Permissions

Distributed

Social Engineering

Operational Impact

(Simmons et. al. 2014)

(Simmons et. al. 2014)

Types and examples of cyber harm (Agrafiotis et. al., 2016:30)

• The sample of 67 managers from a range of industries should not be taken as a representative sample, as the number is too small and the selection of participants was somewhat opportunistic. Our findings thus provide a ‘snapshot’ that suggests areas that need detailed further exploration:

• Wanting a more consistent approach to cyber threat to be presented in plain English to avoid confusion

• Respondents demonstrated a surprising lack of knowledge of cyber attacks, monitoring, reporting, and mitigation strategies and practices, which suggests a larger problem in cyber security

• The widespread adoption of cyber security practices themselves has yet to occur, and this proposition is very concerning for cyber security professionals.

• Identifiable bias towards IT and technology in general

• Cyber security as an IT issue

Summary Findings from the Focus Groups (cont.)

• Acknowledgement of the need to take personal responsibility, in action and communication, but a failure to do so

• Managers lacked knowledge and understanding despite induction courses, and in some cases cyber awareness schemes

• Feeling panic, the ‘awfulness’ of cyber breach, and a total lack of knowledge of what to do and who to report incidents to

• The value of knowledge sharing

• Straightforward and consistent approaches to cyber threats.

• Desire to know more about cyber threats and what they can do about them

Summary Findings from the Focus Groups (cont.)

A Universal Cyber Threat Taxonomy

A Universal Cyber Attack Taxonomy

Access

Vulnerability

Action

Target

Unauthorised Result

A Universal Cyber Attack Taxonomy

Access

Vulnerability

Action

Target

Unauthorised Result

Knowledge-based Cyber Resilience Framework

Stage 1: Non-existent Cyber Resilience

Stage 2: Immature Cyber Resilience

Stage 3: Established Basic Cyber Resilience

Stage 4: Reactive Cyber Resilience

Stage 5: Fully Proactive and Reactive Cyber

Resilience

Only Generic Capabilities associated with ‘business as usual’

Generic capabilities Generic capabilities Generic Capabilities Generic Capabilities

Ordinary Defensive Capability

Ordinary Defensive Capability

Ordinary Defensive Capability

Ordinary Defensive Capability

Internal Monitoring Capability

Internal Monitoring Capability

Internal Monitoring Capability

External Monitoring Capability

External Monitoring Capability

Extra-Ordinary Capability

Extra-Ordinary Capability

Reactive Dynamic Capability

Reactive Dynamic Capability

Proactive Dynamic Capability

Future Proofing

‘Hacking Back’

Advice and Guidance

• At the ‘Access’ step an organisation has to determine whether physical access and/or virtual access is possible to hostile actors

• This means reviewing the physical security measures in place to assess whether physical access can be obtained

• This will include policies and practices associated with security card limited access to sensitive areas, the use of USB devices, zip drives, the use of own devices whilst at work, and subcontracting arrangements

• In terms of virtual access the organisation should review policies and procedures in relation to their supply chain and information sharing, password protection, whitelisting, and authentication

Access

At the ‘Vulnerabilities’ step the organisation should seek to limit the vulnerabilities by considering the design, implementation and

configuration of hard and soft systems, including IDS

Vulnerability

Action At the ‘Action’ step each of the alternatives should be examined in

order to assess what limits and controls can be put in place to stop each of these actions

At the ‘Target’ step the organisation should seek to reduce the potential availability of targets for a hostile actor.

The possibilities here are numerous, and should be tailored to the specific characteristics of the organisation in question

Target

Unauthorised Results If appropriate defensive measures are in place these results will

be avoided and cyber harm should not occur

• The new Cyber Threat Taxonomy, Cyberattack Taxonomy, and Knowledge-based Cyber Resilience Framework presented here provide the foundational models for a common language in cyber security

• Managers can use these models to assess their own stage of development, the options available within the cyber security ecosystem, and thus make more informed decisions as to resource deployment and procurement to build cyber resilience

• It also allows a manager to review the organisation’s cyber resilience in relation to the NIST IT Security Maturity Model in a more nuanced way by locating the policies, procedures, implementation, testing and integration levels of the NIST model within, and across, each of the five stages of the Cyber Resilience Framework

• This encourages a holistic understanding of cyber resilience that incorporates IT security, as the framework presented includes response by an organisation, through incorporating EOCs triggered when security controls have been proved to be ineffective

• Adopting these models across industries would enhance our understanding of cyber security and enable managers to improve communication, coordination, governance, and recovery when managing cyber security

Questions

Research paper can be downloaded from:

www.swiftinstitute.org